<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Splunk on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/splunk/</link><description>Recent content in Splunk on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Wed, 15 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/splunk/index.xml" rel="self" type="application/rss+xml"/><item><title>Splunk-AWSRaid</title><link>https://hexpysya.github.io/blue_team/splunk-awsraid/</link><pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/splunk-awsraid/</guid><description>An attacker conducted a brute-force attack to compromise the helpdesk.luke account, performed reconnaissance from various VPN IPs, exfiltrated sensitive data including customer backups and secrets, modified bucket permissions, and established persistence by creating an admin backdoor account.</description></item><item><title>Splunk-ShadowRoast</title><link>https://hexpysya.github.io/blue_team/splunk-shadowroast/</link><pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/splunk-shadowroast/</guid><description>A masqueraded AdobeUpdater.exe binary established persistence via a registry Run key, injected into cmd.exe, performed AS-REP Roasting with Rubeus against four AD accounts, laterally moved to FileServer using cracked tcooper credentials, enabled RDP, and staged share data for exfiltration.</description></item><item><title>Splunk-NerisBot</title><link>https://hexpysya.github.io/blue_team/splunk-nerisbot/</link><pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/splunk-nerisbot/</guid><description>A victim host downloaded multiple malicious executables via HTTP, including Emotet, ransomware, and trojan payloads, detected through Suricata IDS alerts and confirmed malicious via VirusTotal.</description></item><item><title>Splunk-T1110-003</title><link>https://hexpysya.github.io/blue_team/splunk-t1110-003/</link><pubDate>Tue, 07 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/splunk-t1110-003/</guid><description>An attacker from 192.168.1.60 (Kali) conducted a 5-minute RDP password spraying attack against dev.cyberdefenders.org, generating 4302 failed logon attempts across multiple usernames, and successfully authenticated as administrator and five other accounts via RDP.</description></item><item><title>THM-Phishing Unfolding</title><link>https://hexpysya.github.io/blue_team/thm-phishing-unfolding/</link><pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/thm-phishing-unfolding/</guid><description/></item><item><title>THM-Phishing</title><link>https://hexpysya.github.io/blue_team/thm-phishing/</link><pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/thm-phishing/</guid><description>Three phishing campaigns were identified across four alerts: a legitimate HR onboarding email (false positive), a fake Amazon delivery notification whose bit.ly link was blocked by the firewall, and a Microsoft account spoofing email from m1crosoftsupport.co whose link was allowed through the firewall</description></item></channel></rss>